Presentaciones de la Defcon 19

El 7 de agosto terminaba la Defcon 19 y, en el momento de escribir esta entrada, su web sufría un DDoS producido por la cantidad de miles de usuarios como yo, ávidos del tan esperado material de las conferencias.

Sorprendentemente, Chief Monkey pone ya a nuestra disposición los pdfs de las presentaciones y, aunque la celeridad de su publicación hacía sospechar de su seguridad, parece que son fidedignos, o eso espero ;)

dc-19-program.pdf
DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf
DEFCON-19-Abstrct-The-Schemaverse.pdf
DEFCON-19-Almeida-Workshop-ESD.pdf
DEFCON-19-Alonso-Garrido-DUST.pdf
DEFCON-19-Alonso-Garrido-Excel.pdf
DEFCON-19-Arlen-Nano-Seconds-WP.pdf
DEFCON-19-Arlen-Nano-Seconds.pdf
DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf
DEFCON-19-Baldwin-DVCS-WP.pdf
DEFCON-19-Baldwin-DVCS.pdf
DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf
DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf
DEFCON-19-Barnett-Deceptive-Hacking.pdf
DEFCON-19-Bilodeau-FingerBank.pdf
DEFCON-19-Bilodeau-PacketFence.pdf
DEFCON-19-Bouillon-Federation-and-Empire.pdf
DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf
DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf
DEFCON-19-Bryner-Kinectasploit.pdf
DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf
DEFCON-19-Chamales-Securing-Crisis-Maps.pdf
DEFCON-19-Chow-Abusing-HTML5.pdf
DEFCON-19-Conti-Security-Research.pdf
DEFCON-19-Cook-Kernel-Exploitation.pdf
DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf
DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf
DEFCON-19-Crowley-Cryptographic-Oracles.pdf
DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf
DEFCON-19-DC-Groups-Panel.pdf
DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf
DEFCON-19-Dinaburg-Bit-Squatting.pdf
DEFCON-19-Duckwall-Bridge-Too-Far.pdf
DEFCON-19-Elhage-Virtualization-Under-Attack.pdf
DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf
DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf
DEFCON-19-Fail-Panel.pdf
DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf
DEFCON-19-Foofus-Forceful-Browsing-WP.pdf
DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf
DEFCON-19-Garcia-UPnP-Mapping-WP.pdf
DEFCON-19-Garcia-UPnP-Mapping.pdf
DEFCON-19-Gavin-OpenDLP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security.pdf
DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf
DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf
DEFCON-19-Havelt-Henrique.pdf
DEFCON-19-Heiland-Printer-To-Pwnd.pdf
DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf
DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf
DEFCON-19-Howard-Cyber-Security-Trends.pdf
DEFCON-19-Imhoff-Password-Cracking.pdf
DEFCON-19-JackDaniel-PCI-2-PANEL.pdf
DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf
DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf
DEFCON-19-Kennish-Tracking-the-Trackers.pdf
DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf
DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf
DEFCON-19-Krick-License-to-Transmit.pdf
DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf
DEFCON-19-Lenik-MAC(b)Daddy.pdf
DEFCON-19-Linn-PIG-Finding-Truffles.pdf
DEFCON-19-Maresca-FIPS-140.pdf
DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf
DEFCON-19-McCoy-Hacking-Net.pdf
DEFCON-19-McGrew-Covert-WP.pdf
DEFCON-19-McGrew-Covert.pdf
DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf
DEFCON-19-Miller-Battery-Firmware-Hacking.pdf
DEFCON-19-O’Neil-Chin-Google-Android.pdf
DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf
DEFCON-19-Ollam-Gun-Safes.pdf
DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf
DEFCON-19-Percoco-Spiderlabs-Droid.pdf
DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf
DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf
DEFCON-19-Phillips-Hacking-MMORPGs.pdf
DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf
DEFCON-19-Pickett-Resources.pdf
DEFCON-19-Pittman-Password-Fail.pdf
DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf
DEFCON-19-Robinson-Time.pdf
DEFCON-19-Schearer-WTF-Privacy.pdf
DEFCON-19-Shah-Mobile-Moolah.pdf
DEFCON-19-Skunkworks-Bitcoin.pdf
DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf
DEFCON-19-Street-Steal-Everything.pdf
DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf
DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf
DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf
DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf
DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf
DEFCON-19-Trimble-Cybertravel.ppt.pdf
DEFCON-19-Webb-Runtime-Process-Insemination.pdf
DEFCON-19-Weeks-Network-Nightmare.pdf
DEFCON-19-Weyers-Key-Impressioning.pdf
DEFCON-19-Wilson-Traps-of-Gold.pdf
DEFCON-19-Woodberg-Network-Application-Firewalls.pdf
DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf
DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf

Repositorio: http://good.net/dl/k4r3lj/DEFCON19/ (echa un vistazo al resto de material ^o^)

Descarga pdfs sin abusar de tanto clic:

curl -silent http://good.net/dl/k4r3lj/DEFCON19/ | grep -i 'pdf' | cut -d '"' -f 8 | cut -d '<' -f 1 | grep -v '/' > dc19pdf.txt; for i in $(cat dc19pdf.txt); do curl --location "http://THIS-DOWNLOAD-WOULD-BE-FASTER-WITH-A-PREMIUM-ACCOUNT-AT-good.net" -L "http://good.net/dl/k4r3lj/DEFCON19/$i" > $i; done

Comentarios